Jin Cao

Orcid: 0009-0006-5272-9671

According to our database1, Jin Cao authored at least 176 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A UAV-Assisted UE Access Authentication Scheme for 5G/6G Network.
IEEE Trans. Netw. Serv. Manag., April, 2024

CADFA: A Clock Skew-Based Active Device Fingerprint Authentication Scheme for Class-1 IoT Devices.
IEEE Syst. J., March, 2024

A fast time integral finite difference method for a space-time fractional FitzHugh-Nagumo monodomain model in irregular domains.
J. Comput. Phys., March, 2024

Wiretap resisting and privacy preserving data exchange with physical layer security and blockchain based authentication in Internet of Vehicles.
Microprocess. Microsystems, 2024

2023
A Novel Access and Handover Authentication Scheme in UAV-Aided Satellite-Terrestrial Integration Networks Enabling 5G.
IEEE Trans. Netw. Serv. Manag., September, 2023

Fine-grained imbalanced leukocyte classification with global-local attention transformer.
J. King Saud Univ. Comput. Inf. Sci., September, 2023

Identification and evaluation of competitive products based on online user-generated content.
Expert Syst. Appl., September, 2023

FHAP: Fast Handover Authentication Protocol for High-Speed Mobile Terminals in 5G Satellite-Terrestrial-Integrated Networks.
IEEE Internet Things J., August, 2023

Adaptive receptive field U-shaped temporal convolutional network for vulgar action segmentation.
Neural Comput. Appl., May, 2023

A Software-Based Remote Attestation Scheme for Internet of Things Devices.
IEEE Trans. Dependable Secur. Comput., 2023

Multi-Keyword Searchable and Verifiable Attribute-Based Encryption Over Cloud Data.
IEEE Trans. Cloud Comput., 2023

Secure and Efficient Smart Healthcare System Based on Federated Learning.
Int. J. Intell. Syst., 2023

LK-AKA: A lightweight location key-based authentication and key agreement protocol for S2S communication.
Comput. Commun., 2023

Interpreting Disparate Privacy-Utility Tradeoff in Adversarial Learning via Attribute Correlation.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2023

Identifying Controversial Pairs in Item-to-Item Recommendations.
Proceedings of the 17th ACM Conference on Recommender Systems, 2023

Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with Soft Biometrics.
Proceedings of the Information Security Practice and Experience, 2023

A Sensitivity-aware and Block-wise Pruning Method for Privacy-preserving Federated Learning.
Proceedings of the IEEE Global Communications Conference, 2023

DP-Loc: A Differential Privacy-Based Indoor Localization Scheme with Bilateral Privacy Protection.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

Sharing Encoder Representations across Languages, Domains and Tasks in Large-Scale Spoken Language Understanding.
Proceedings of the The 61st Annual Meeting of the Association for Computational Linguistics: Industry Track, 2023

2022
A Group-Based Multicast Service Authentication and Data Transmission Scheme for 5G-V2X.
IEEE Trans. Intell. Transp. Syst., 2022

EAP-DDBA: Efficient Anonymity Proximity Device Discovery and Batch Authentication Mechanism for Massive D2D Communication Devices in 3GPP 5G HetNet.
IEEE Trans. Dependable Secur. Comput., 2022

Decentralized authentication and access control protocol for blockchain-based e-health systems.
J. Netw. Comput. Appl., 2022

A robust authentication scheme for remote diagnosis and maintenance in 5G V2N.
J. Netw. Comput. Appl., 2022

Blockchain-Enabled decentralized Attribute-Based access control with policy hiding for smart healthcare.
J. King Saud Univ. Comput. Inf. Sci., 2022

Verifiable and privacy preserving federated learning without fully trusted centers.
J. Ambient Intell. Humaniz. Comput., 2022

A Novel PUF-Based Group Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks.
IEEE Internet Things J., 2022

RPRIA: Reputation and PUF-Based Remote Identity Attestation Protocol for Massive IoT Devices.
IEEE Internet Things J., 2022

Alexa Teacher Model: Pretraining and Distilling Multi-Billion-Parameter Encoders for Natural Language Understanding Systems.
CoRR, 2022

An Efficient Deep Learning Approach To IoT Intrusion Detection.
Comput. J., 2022

Inference Acceleration with Adaptive Distributed DNN Partition over Dynamic Video Stream.
Algorithms, 2022

DAME: Domain Adaptation for Matching Entities.
Proceedings of the WSDM '22: The Fifteenth ACM International Conference on Web Search and Data Mining, Virtual Event / Tempe, AZ, USA, February 21, 2022

DP-Opt: Identify High Differential Privacy Violation by Optimization.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

SmartCircles: A Benefit-Evaluation-Based Privacy Policy Recommender for Customized Photo Sharing.
Proceedings of the IEEE Smartworld, 2022

A Terminal Security Authentication Protocol for Zero-Trust Satellite IoT.
Proceedings of the IEEE International Conference on Trust, 2022

Instilling Type Knowledge in Language Models via Multi-Task QA.
Proceedings of the Findings of the Association for Computational Linguistics: NAACL 2022, 2022

Attention Fusion: a light yet efficient late fusion mechanism for task adaptation in NLU.
Proceedings of the Findings of the Association for Computational Linguistics: NAACL 2022, 2022


2021
CPPHA: Capability-Based Privacy-Protection Handover Authentication Mechanism for SDN-Based 5G HetNets.
IEEE Trans. Dependable Secur. Comput., 2021

A Multi-Agent Communication Based Model for Nested Named Entity Recognition.
IEEE ACM Trans. Audio Speech Lang. Process., 2021

Scalable Attestation Protocol Resilient to Physical Attacks for IoT Environments.
IEEE Syst. J., 2021

Recurrent neural network from adder's perspective: Carry-lookahead RNN.
Neural Networks, 2021

Perturbing fMRI brain dynamics using transcranial direct current stimulation.
NeuroImage, 2021

The recognition of plastic bottle using linear multi hierarchical SVM classifier.
J. Intell. Fuzzy Syst., 2021

Recommending tags for pull requests in GitHub.
Inf. Softw. Technol., 2021

Multi-attribute group decision-making considering opinion dynamics.
Expert Syst. Appl., 2021

Flexible and anonymous network slicing selection for C-RAN enabled 5G service authentication.
Comput. Commun., 2021

Implementation of national comparison of optical speed meters in China.
Proceedings of the IEEE International Workshop on Metrology for Automotive, 2021

AdaPDP: Adaptive Personalized Differential Privacy.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

SeLaB: Semantic Labeling with BERT.
Proceedings of the International Joint Conference on Neural Networks, 2021

Zero-shot Generalization in Dialog State Tracking through Generative Question Answering.
Proceedings of the 16th Conference of the European Chapter of the Association for Computational Linguistics: Main Volume, 2021

Scalable Outlier Detection Using Distance Projections.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

A Nested Named Entity Recognition Model Based on Multi-agent Communication Mechanism (Student Abstract).
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
FTGPHA: Fixed-Trajectory Group Pre-Handover Authentication Mechanism for Mobile Relays in 5G High-Speed Rail Networks.
IEEE Trans. Veh. Technol., 2020

Double-Line Frequency Ripple Suppression of a Quasi-Single Stage AC-DC Converter.
IEEE Trans. Circuits Syst. II Express Briefs, 2020

Land Subsidence Response to Different Land Use Types and Water Resource Utilization in Beijing-Tianjin-Hebei, China.
Remote. Sens., 2020

An Improved Multi-Sensor MTI Time-Series Fusion Method to Monitor the Subsidence of Beijing Subway Network during the Past 15 Years.
Remote. Sens., 2020

Impaired mesocorticolimbic connectivity underlies increased pain sensitivity in chronic low back pain.
NeuroImage, 2020

Characterizing the analgesic effects of real and imagined acupuncture using functional and structure MRI.
NeuroImage, 2020

An Adaptive Security Data Collection and Composition Recognition method for security measurement over LTE/LTE-A networks.
J. Netw. Comput. Appl., 2020

LAA: Lattice-Based Access Authentication Scheme for IoT in Space Information Networks.
IEEE Internet Things J., 2020

LSAA: A Lightweight and Secure Access Authentication Scheme for Both UE and mMTC Devices in 5G Networks.
IEEE Internet Things J., 2020

Towards Semi-Supervised Semantics Understanding from Speech.
CoRR, 2020

Semantic Labeling Using a Deep Contextualized Language Model.
CoRR, 2020

A Lightweight Algorithm to Uncover Deep Relationships in Data Tables.
CoRR, 2020

A Fast Randomized Algorithm for Finding the Maximal Common Subsequences.
CoRR, 2020

A personalized range-sensitive privacy-preserving scheme in LBSs.
Concurr. Comput. Pract. Exp., 2020

A Survey on Security Aspects for 3GPP 5G Networks.
IEEE Commun. Surv. Tutorials, 2020

Adaptive on Time Controlled Double-Line- Frequency Ripple Suppressor With Fast Dynamic Response and High Efficiency.
IEEE Access, 2020

Utility-aware Exponential Mechanism for Personalized Differential Privacy.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

A Secure Authentication Scheme for Remote Diagnosis and Maintenance in Internet of Vehicles.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

Style Attuned Pre-Training and Parameter Efficient Fine-Tuning for Spoken Language Understanding.
Proceedings of the Interspeech 2020, 2020

Detecting Local Machine Data Leakage in Real Time.
Proceedings of the Advances in Digital Forensics XVI, 2020

Decision-Making for Intrusion Response: Which, Where, in What Order, and How Long?
Proceedings of the 2020 IEEE International Conference on Communications, 2020

A Framework to Preserve User Privacy for Machine Learning as a Service.
Proceedings of the IEEE Global Communications Conference, 2020

Incorporating Boundary and Category Feature for Nested Named Entity Recognition.
Proceedings of the Database Systems for Advanced Applications, 2020

2019
Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-Assisted Industrial IoT.
IEEE Trans. Ind. Informatics, 2019

Identifying inter-individual differences in pain threshold using brain connectome: a test-retest reproducible study.
NeuroImage, 2019

A neural mechanism of direct and observational conditioning for placebo and nocebo responses.
NeuroImage, 2019

Anti-Quantum Fast Authentication and Data Transmission Scheme for Massive Devices in 5G NB-IoT System.
IEEE Internet Things J., 2019

Fast Authentication and Data Transfer Scheme for Massive NB-IoT Devices in 3GPP 5G Network.
IEEE Internet Things J., 2019

Revisiting Computation Partitioning in Future 5G-Based Edge Computing Environments.
IEEE Internet Things J., 2019

LPPA: Lightweight privacy-preservation access authentication scheme for massive devices in fifth Generation (5G) cellular networks.
Int. J. Commun. Syst., 2019

Augmented Data Science: Towards Industrialization and Democratization of Data Science.
CoRR, 2019

Artificial bee colony algorithm based on Parzen window method.
Appl. Soft Comput., 2019

Urbanization effects on vegetation cover in major African cities during 2001-2017.
Int. J. Appl. Earth Obs. Geoinformation, 2019

An Internet of Things-enabled BIM platform for modular integrated construction: A case study in Hong Kong.
Adv. Eng. Informatics, 2019

PPSHA: Privacy preserving secure handover authentication scheme for all application scenarios in LTE-A networks.
Ad Hoc Networks, 2019

Certificateless Multi-Party Authenticated Encryption for NB-IoT Terminals in 5G Networks.
IEEE Access, 2019

A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT.
IEEE Access, 2019

Quantum-Resistance Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

A Study and Enhancement to the Security of MANET AODV Protocol Against Black Hole Attacks.
Proceedings of the 2019 IEEE SmartWorld, 2019

Two-Sample Tests for High Dimensional Distributions Using One-Dimensional Random Projections.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2019

Statistical Enrichment Models for Activity Inference from Imprecise Location Data.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

CLUES: Detection of User Intent through Interactive Comparison.
Proceedings of the Advances in Data Mining, 2019

Privacy-Preserving Device Discovery and Authentication Scheme for D2D Communication in 3GPP 5G HetNet.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

DIAM: Diversified Identity Authentication Mechanism for 5G Multi-Service System.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

An Extended Control Framework for Privacy-Preserving Photo Sharing across Different Social Networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

An Improved GA-KRR Nested Learning Approach for Refrigeration Compressor Performance Forecasting<sup>*</sup>.
Proceedings of the 15th IEEE International Conference on Automation Science and Engineering, 2019

Quantified Understanding of Syrian Refugee Integration in Turkey.
Proceedings of the Guide to Mobile Data Analytics in Refugee Scenarios, 2019

2018
UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks.
Secur. Commun. Networks, 2018

EGHR: Efficient group-based handover authentication protocols for mMTC in 5G wireless networks.
J. Netw. Comput. Appl., 2018

A unified clustering approach for identifying functional zones in suburban and urban areas.
Proceedings of the IEEE INFOCOM 2018, 2018

Automated Mining of Approximate Periodicity on Numeric Data: A Statistical Approach.
Proceedings of the 2nd International Conference on Compute and Data Analysis, 2018

Achieving Personalized k-Anonymity against Long-Term Observation in Location-Based Services.
Proceedings of the IEEE Global Communications Conference, 2018

2017
A Selective Re-Query Case Sensitive Encoding Scheme Against DNS Cache Poisoning Attacks.
Wirel. Pers. Commun., 2017

G2RHA: Group-to-Route Handover Authentication Scheme for Mobile Relays in LTE-A High-Speed Rail Networks.
IEEE Trans. Veh. Technol., 2017

An Automata Based Intrusion Detection Method for Internet of Things.
Mob. Inf. Syst., 2017

Learning Robust Dialog Policies in Noisy Environments.
CoRR, 2017

A secure SDN based multi-RANs architecture for future 5G networks.
Comput. Secur., 2017

Uncalibrated peg-hole alignment using visual servoing.
Proceedings of the 2017 IEEE International Conference on Real-time Computing and Robotics, 2017

Statistical network behavior based threat detection.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Extracting mobile user behavioral similarity via cell-level location trace.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Trajectory prediction-based handover authentication mechanism for mobile relays in LTE-A high-speed rail networks.
Proceedings of the IEEE International Conference on Communications, 2017

2016
Computing road signatures from cell sequences with minimum inconsistencies.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Online activities categorization of mobile users.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

2015
GBAAM: group-based access authentication for MTC in LTE networks.
Secur. Commun. Networks, 2015

A fast gene selection method for multi-cancer classification using multiple support vector data description.
J. Biomed. Informatics, 2015

A novel group access authentication and key agreement protocol for machine-type communication.
Trans. Emerg. Telecommun. Technol., 2015

UGHA: Uniform group-based handover authentication for MTC within E-UTRAN in LTE-A networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

GAHAP: A group-based anonymity handover authentication protocol for MTC in LTE-A networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
Access Authentication of Mass Device Connections for MTC in LTE Networks.
Smart Comput. Rev., 2014

Group-based authentication and key agreement for machine-type communication.
Int. J. Grid Util. Comput., 2014

Sparse signal recovery with unknown signal sparsity.
EURASIP J. Adv. Signal Process., 2014

A Survey on Security Aspects for LTE and LTE-A Networks.
IEEE Commun. Surv. Tutorials, 2014

Enterprise Social Networking Data Analytics Within Alcatel-Lucent.
Bell Labs Tech. J., 2014

A Multi-Layer Dynamic Model for Customer Experience Analytics.
Bell Labs Tech. J., 2014

An Automatic Counting Method of Maize Ear Grain Based on Image Processing.
Proceedings of the Computer and Computing Technologies in Agriculture VIII, 2014

2013
A New Roaming Authentication Framework For Wireless Communication.
KSII Trans. Internet Inf. Syst., 2013

A Lightweight Three-Party Privacy-preserving Authentication Key Exchange Protocol Using Smart Card.
KSII Trans. Internet Inf. Syst., 2013

Enterprise social network analysis and modeling: A tale of two graphs.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Integrated capacity allocation policies for a production service system with two-class customers and items.
Proceedings of the 2013 IEEE International Conference on Automation Science and Engineering, 2013

2012
An Uniform Handover Authentication between E-UTRAN and Non-3GPP Access Networks.
IEEE Trans. Wirel. Commun., 2012

Security Issues on Machine to Machine Communications.
KSII Trans. Internet Inf. Syst., 2012

An efficient MAC scheme for secure network coding with probabilistic detection.
Frontiers Comput. Sci., 2012

A simple and robust handover authentication between HeNB and eNB in LTE networks.
Comput. Networks, 2012

Dynamic Group Based Authentication Protocol for Machine Type Communications.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

A lightweight roaming authentication protocol for anonymous wireless communication.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Unified handover authentication between heterogeneous access systems in LTE networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

A group-based authentication and key agreement for MTC in LTE networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

A Mixed Multi-tenancy Data Model and Its Migration Approach for the SaaS Application.
Proceedings of the 2012 IEEE Asia-Pacific Services Computing Conference, 2012

2011
Distinct counting with a self-learning bitmap
CoRR, 2011

Modeling time correlation in passive network loss tomography.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

2010
Network Tomography: Identifiability and Fourier Domain Estimation.
IEEE Trans. Signal Process., 2010

Sequential hashing: A flexible approach for unveiling significant patterns in high speed networks.
Comput. Networks, 2010

Tracking Long Duration Flows in Network Traffic.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Tracking Quantiles of Network Data Streams with Dynamic Operations.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Identifying suspicious activities through DNS failure graph analysis.
Proceedings of the 18th annual IEEE International Conference on Network Protocols, 2010

2009
Tracking Cardinality Distributions in Network Traffic.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Monitoring Time-Varying Network Streams Using State-Space Models.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Distinct Counting with a Self-Learning Bitmap.
Proceedings of the 25th International Conference on Data Engineering, 2009

2008
Traffic recovery time constrained shared sub-path protection algorithm in survivable WDM networks.
Comput. Networks, 2008

Intuitive network applications: Learning user context and behavior.
Bell Labs Tech. J., 2008

Estimating cardinality distributions in network traffic: extended abstract.
Proceedings of the 2008 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2008

Mobile User Profile Acquisition through Network Observables and Explicit User Queries.
Proceedings of the 9th International Conference on Mobile Data Management (MDM 2008), 2008

A Quasi-Likelihood Approach for Accurate Traffic Matrix Estimation in a High Speed Network.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Shared Sub-Path Protection Algorithm with Recovery Time Constraint in WDM Networks.
Proceedings of the Fourth International Conference on Networking and Services, 2008

Online Identification of Applications Using Statistical Behavior Analysis.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
A new shared-risk link groups (SRLG)-disjoint path provisioning with shared protection in WDM optical networks.
J. Netw. Comput. Appl., 2007

A novel recursive shared segment protection algorithm in survivable WDM networks.
J. Netw. Comput. Appl., 2007

Optical Communications New and enhanced protection scheme in survivable meshed WDM optical networks.
Eur. Trans. Telecommun., 2007

Highly efficient styrylamine-doped blue and white organic electroluminescent devices.
Displays, 2007

Spectral studies of white organic light-emitting devices based on multi-emitting layers.
Displays, 2007

A Simple and Efficient Estimation Method for Stream Expression Cardinalities.
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007

A Fast and Compact Method for Unveiling Significant Patterns in High Speed Networks.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

2006
Enhancement of red organic light-emitting diodes via cascade energy transfer.
Microelectron. J., 2006

Dynamic survivable routing heuristic for shared protected WDM optical networks.
IEEE Commun. Lett., 2006

Nonlinear 3-D Motion Simulation Using Multi-Sensor Data Fusion.
Proceedings of the 2006 International Conference on Modeling, 2006

Measuring Human Satisfaction in Data Networks.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

Dynamic Path Shared Protection for Survivable Differentiated Reliable WDM Optical Networks.
Proceedings of the Distributed Computing and Networking, 8th International Conference, 2006

2004
Stochastic Models for Generating Synthetic HTTP Source Traffic.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

Fault diagnosis in a class of nonlinear systems using identification and GLR testing.
Proceedings of the 2004 American Control Conference, 2004

Partial PCA-based optimal structured residual design for fault isolation.
Proceedings of the 2004 American Control Conference, 2004

2002
A Poisson Limit for Buffer Overflow Probabilities.
Proceedings of the Proceedings IEEE INFOCOM 2002, 2002

The effect of insufficient excitation in PCA estimation.
Proceedings of the American Control Conference, 2002

2001
On the nonstationarity of Internet traffic.
Proceedings of the Joint International Conference on Measurements and Modeling of Computer Systems, 2001

Noise-induced bias in PCA modeling of linear system.
Proceedings of the American Control Conference, 2001


  Loading...